Cyber Security Work shop by Kapil Mehrotra 11/06/2021. For cybersecurity workshop contact me [email protected]
Size: 843.43 KB
Language: en
Added: Jun 11, 2021
Slides: 24 pages
Slide Content
Cyber Security Awareness Session
Copyright By Kapil Mehrotra
Date : 1/06/2021
About Myself
•Name : Kapil Mehrotra
•Experience : 24Yrs (Time files ☺)
•Mostly worked in BFSI & Healthcare domain
•Having little learning curve & patience listener.
•Like to buy books a lot.. ☺slow reader but try to complete one book at least
in a month.
•Like too much adventures in the life. (From where people say “Hum se naho
payega” from there I start to search for “Hum se ho payega”) (+V)
•Love all kind of sports (Gyming, Golfing, Running, Marathon, Dance, Cricket
etc.)
•Die hard animal lover.
•Very active in few government communities for drafting Cloud and Cyber
security skill development policies since 2015.
Type of cyber threats
•“Phishing Attacks” to steal the User ID and Passwords and to gain
the access of the server, laptop or desktop.
•“Fake Link” Through this hacker gain the remote control of the
victim devices to steal OTP , PayTM, UPI, Credit Card, Contacts,
Images, Videos and documents. (anydesk, teamviewer, logmein,
Ammyy)
•Social media scams (Twitter, Facebook, Instagram)
•SQL injection, Virus, Malware and Ransomware
•Fake websites that steal data.
•DDOS & Network attacks
•Insider attacks
What are the consequences of a cyber attack?
Cyberattackscandisruptandcauseconsiderable
financialandreputationaldamagetoeventhemost
resilientorganization.Ifyousufferacyberattack,you
standtoloseData,reputationandbusiness,and
potentiallyfaceregulatoryfinesandlitigation–aswell
asthecostsofremediation.
Why do we need Cyber Security
•In 2020 we must secure 300 billion passwords globally.
•There are 111 billion lines of new software code being produced each year,
•The world’s digital content is expected to grow 96 zettabytes by 2020
•Dark Web is 5000 times larger than the surface web.
•20 million connected cars will ship with built-in software-based security
technology by 2020
•1 Cr 80L Daily Images getting uploaded on the internet
•50 billion devices connected to the Internet by 2020
Look at the Hackers Roadmap
•On average 30,000 new websites are getting hacked every day.
•Hackers create 300,000 new pieces of malware daily.
•There is a hacker attack every 39 seconds
•62% people are experiencing phishing attacks
•64% of companies have experienced web-based attacks
•Distributed denial-of-service (DDoS) attack grew to more than
1.44TB, increasing in size by 500%.
•41% ransomware attacks are rising year on year.
Attacks : 1,58,727 per hour, 2,645 per minute and 75 every second of
every day
Few Use Cases of
Cyber Security
Ashley Madison –Hack (Lawsuit $30 million)
Ashley Madison
37Million (9.8GB data) hacked and dumped on DW(PII)
Sony Hack
Sony Hack costed $15 Million
Reason:NorthKoreawarnsSonybeforethelaunchof
movebecauseitwasrelatedwith“KimJongUn”
Interviewandassassinationconspiracy&makingfunfor
theirpresident.
Sony has not taken it seriously.
Hackerhacked47,000currentandformersemployee
data,HRData,UserIds&Passwords,ClinicalInformation,
SSONo,Allemailsand100TBdataincluding(Moviesi.e
AaronandDave’s-“TheInterview”,BradPitt’s-“Fury”
Do you know?
Kevin Mitnick is the biggest hacker in the world.
1.Mitnick Security Consulting
2.Security awareness training company “KnowBe4”
3.Board Of Director in “Zimperium”
4.Film : Track Down
5.An Author
IT Act & Data Privacy in India
1.InformationTechnologyAct,2000.(India)
2.ITAmendmentAct2000tostrengthenthecybersecurity
laws.(Section43,65to71).i.e.Hacking,failindata
protection,usingimage,videoorcontentwithout
permissionetc.)
3.EUGeneralDataProtectionRegulation(GDPR)
4.ThePersonalDataProtectionBill,2019(PI&PIIdata
shouldbeprocessedandstored)
Note:
UptothreeyearsImprisonmentor/andfineupto5L
AppointmentofDPO(DataProtectionOfficer
•Do not share your password
•Keep Changing your password frequently
•Do not click on the anonymous link from any laptop or mobile
•Don’t open any emails which comes from strangers. (It may be phishing email).
•Don’t download songs and movies
•Don’t use USB or any external devices from out sides.
•Don’t transfer data from mobile & In Mobile storage.
•“Be Aware”We monitor you through DLP and logs your daily activities.
•Apps should maintain user login and logout status as well.
Do’s & Don'ts
Is your email have been compromised ever
•https://haveibeenpwned.com/
•https://www.security.org/how-secure-is-my-password/
Practical
How to report a cyber crime in India?
https://cybercrime.gov.in/Default.aspx
ForWomenandChild: [email protected]